Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems

This paper proposes a training-based channel estimation scheme for achieving quality-of-service discrimination between legitimate and unauthorized receivers in wireless multiple-input multiple-output (MIMO) channels. The proposed method has applications ranging from user discrimination in wireless TV broadcast systems to the prevention of eavesdropping in secret communications. By considering a wireless MIMO system that consists of a multiple-antenna transmitter, a legitimate receiver (LR) and an unauthorized receiver (UR), we propose a multi-stage training-based discriminatory channel estimation (DCE) scheme that aims to optimize the channel estimation performance of the LR while limiting the channel estimation performance of the UR. The key idea is to exploit the channel estimate fed back from the LR at the beginning of each stage to enable the judicious use of artificial noise (AN) in the training signal. Specifically, with knowledge of the LR's channel, AN can be properly superimposed with the training data to degrade the UR's channel without causing strong interference on the LR. The channel estimation performance of the LR in earlier stages may not be satisfactory due to the inaccuracy of the channel estimate and constraints on the UR's estimation performance, but can improve rapidly in later stages as the quality of channel estimate improves. The training data power and AN power are optimally allocated by minimizing the normalized mean-square error (NMSE) of the LR subject to a lower limit constraint on the NMSE of the UR. The proposed DCE scheme is then extended to the case with multiple LRs and multiple URs. Simulation results are presented to demonstrate the effectiveness of the proposed DCE scheme.

[1]  Ieee Microwave Theory,et al.  IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems Draft Amendment: Management Information Base Extensions , 2007 .

[2]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[3]  Zhu Han,et al.  Amplify-and-forward based cooperation for secure wireless communications , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[4]  Enrico Del Re,et al.  A Novel Approach for Physical Layer Cryptography in Wireless Networks , 2010, Wirel. Pers. Commun..

[5]  Zhu Han,et al.  Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[6]  Ignacio Santamaría,et al.  On the Blind Identifiability of Orthogonal Space–Time Block Codes From Second-Order Statistics , 2008, IEEE Transactions on Information Theory.

[7]  E. Masoud,et al.  Space-Time Block Coding for Wireless Communications , 2008 .

[8]  Akbar M. Sayeed,et al.  Transmit signal design for optimal estimation of correlated MIMO channels , 2004, IEEE Transactions on Signal Processing.

[9]  Chong-Yung Chi,et al.  On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem , 2009, IEEE Transactions on Wireless Communications.

[10]  D. M. Goldschlag,et al.  Security issues in networks with Internet access , 1997 .

[11]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[12]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[13]  A. Lee Swindlehurst,et al.  Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[14]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[15]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[16]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[17]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[18]  Nihar Jindal,et al.  MIMO broadcast channels with finite rate feedback , 2006, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[19]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[20]  Daniel Pérez Palomar,et al.  Power Control By Geometric Programming , 2007, IEEE Transactions on Wireless Communications.

[21]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[22]  Tan F. Wong,et al.  Training sequence optimization in MIMO systems with colored interference , 2004, IEEE Transactions on Communications.

[23]  Xiaohua Li,et al.  Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions , 2007, J. Commun..

[24]  Chong-Yung Chi,et al.  Training Signal Design for Discriminatory Channel Estimation , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[25]  Enrico Del Re,et al.  Design and Implementation of Physical Layer Private Key Setting for Wireless Networks , 2009, 2009 IEEE International Conference on Communications.

[26]  Stephen P. Boyd,et al.  A tutorial on geometric programming , 2007, Optimization and Engineering.

[27]  S. Haykin,et al.  Adaptive Filter Theory , 1986 .

[28]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[29]  A. Lee Swindlehurst,et al.  Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels , 2009, 2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications.